| File name: | bomb.exe |
| Full analysis: | https://app.any.run/tasks/ef1e8f9f-03e1-4274-a2d5-c5f47b905c0b |
| Verdict: | Malicious activity |
| Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
| Analysis date: | June 09, 2024, 16:52:02 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | 55DBA6E7AA4E8CC73415F4E3F9F6BDAE |
| SHA1: | 87C9F29D58F57A5E025061D389BE2655EE879D5D |
| SHA256: | 3CEA805F1396DF15BDBCD4317388A046A41A6079DBA04576A58BA7B2C812338A |
| SSDEEP: | 192:HLmmmmlmtYz0wZick7pDMj4GbCrMz+MCZLa7HhdSbwxz1OLU87glpp/bI6J4yfm4:pmi7k7pMiLLaLhM6OLU870NJqoI |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (82.9) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (7.4) |
| .exe | | | Win32 Executable (generic) (5.1) |
| .exe | | | Generic Win/DOS Executable (2.2) |
| .exe | | | DOS Executable Generic (2.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2048:07:19 19:03:26+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32 |
| LinkerVersion: | 48 |
| CodeSize: | 9728 |
| InitializedDataSize: | 2048 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x457a |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows command line |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | - |
| CompanyName: | - |
| FileDescription: | - |
| FileVersion: | 1.0.0.0 |
| InternalName: | bomb.exe |
| LegalCopyright: | - |
| LegalTrademarks: | - |
| OriginalFileName: | bomb.exe |
| ProductName: | - |
| ProductVersion: | 1.0.0.0 |
| AssemblyVersion: | 1.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 372 | "C:\Users\admin\AppData\Local\Temp\spanEafH9FDLG560\UhsKccgD6BSLFf3oGMiB.exe" | C:\Users\admin\AppData\Local\Temp\spanEafH9FDLG560\UhsKccgD6BSLFf3oGMiB.exe | http77.91.77.80gamesila.exe.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: .NET Host Version: 8.0.424.16909 Modules
RisePro(PID) Process(372) UhsKccgD6BSLFf3oGMiB.exe C2 (1)147.45.47.126:58709 Strings (55)VaultOpenVault \GHISLER\wcx_ftp.ini \.minecraft\launcher_profiles.json \.feather\accounts.json \OpenVPN Connect\profiles S,{w_6 \Session Storage \Games \Minecraft \databases \accounts.xml logins \TotalCommander VaultGetItem \launcher_accounts.json \launcher_msa_credentials.bin \tlauncher_profiles.json \FeatherClient WSASend \LunarClient \accounts.txt \Element \ICQ\0001 \save.dat \Growtopia\save.dat C:\program files\steam \config.json \.purple \Element\Local Storage \Microsoft\Skype for Desktop\Local Storage \OpenVPN Connect \Signal \config \TLauncher \Local Storage \Growtopia \accounts.json \FileZilla frug?0 \Pidgin C:\program files (x86)\steam APPDATA \Messengers \launcher_profiles.json J~|Hw \ey_tokens.txt VaultCloseVault \.lunarclient\settings\games\accounts.txt UaEt, \wcx_ftp.ini \Steam \.minecraft\launcher_accounts.json \Battle.net \.minecraft\launcher_msa_credentials.bin \Skype | |||||||||||||||
| 524 | "C:\Users\admin\Desktop\http46.102.174.48UAC.exe.exe" | C:\Users\admin\Desktop\http46.102.174.48UAC.exe.exe | — | bomb.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 552 | "C:\Users\admin\Desktop\http185.172.128.159timeSync.exe.exe" | C:\Users\admin\Desktop\http185.172.128.159timeSync.exe.exe | bomb.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 552 | "C:\Windows\System32\netbtugc.exe" | C:\Windows\System32\netbtugc.exe | bomb.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: NetBT Unattend Generic Command Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
Formbook(PID) Process(552) netbtugc.exe C2www.3xfootball.com/fo8o/ Strings (160)wZ22jDxn8hwtYnnk/w== q7/IljAuWKUjP9LzhVY6WZAW9xV7Lg== anq78FxRDdKIkSoWlEQ4UEY= eoSThluq4iN+Rc41zntRhYHb6g== O7h30riqRAahR9T5HRI7p/6UE1viZkY= aRcJ4yR+JIlEsDUz7RliR0c= P2kk3YkFysLZ/xr8j/NT j7IAjFzbh8BedRjGafGC 90ZjYDDmDegov0HX93hL+BrlCg== VsB/tN7GW0IFCVxBK3vSdgciaRw= H2irRWi3sEVnQwpn mhcjIf6APjHV6w== HAYqkhKqQwlU/+84 jtQLwFdZ6cHaVA== AcSWbce98Gsa3H82yeOI6PU= P/hl4kjf5lO9sx8CPgVLtN0= FyorLjEqBPkYxd/H21pCdCXeTRU= 2mA3Vksr7QqmQYRh zN7V+QxiOiJucVyPV4tnoEEC8Q== vOXO5TwZqh4J aBo2kIefHxtRX9tg+blTqCBUoaSmUA== ym9QCdS0FskyRQW1K8aS QHqoCUeH3RU= +UJdoYhH0dD7h9tu Gc2LVVpZN7Z5TpULwg8= 4civn4lQpEI= joSQgk4Zulvmr5FllmCK OBlNjAjPL0wWVzbYOvk5KRX20vA= GHL66NFKaYDm0cPfSOTb jgQX31OVhboCZNs= iHkmyaL+z9Qv6pxULDjbdg== uQwC+RvpT7YO1adGimLC pMIXi/72muqkB92h5rtgXF8K1wWh LPlp6EDzMKb54YJ+PsJG 74LKKYDwOswIEZH8 32HxZtOweLPzgYOtapw= jbsLo3quFldiNGxZd/pl4Q== MBujXUAtHYKkJhltfDsCIA== +9Zoakef2z7Z4HWZ3vQOWwgitgY= E3ZGa1Mxh8TVks2o6Jq+2AcLwwY= LpD8ktMaPtn+36mfdJE= PA9jrCXW5/545XgBZQ== 9IdSnrZ6FejIUA== zmTz3LjDiW9gHw== RjQA3SM/LSY/Vm+AzFk9XRqEHgI= cA2gKXAjjUvKHQ== H1UWMp77XV0Vfzckjz5d6JEInA== zMTMqYuyvylNTKeyWdAV5G8= R8FUU7VPz5oOWA== NqVC3s+EEmnc3ZB3qmGgisk= hWkeFU0k8euvtAzROivfAFADzQ== ZLMTNMbPaM6Mll+gaI5SqsEl /5M+8u4pdcT0o1M= klXyGLgc/igvqqUE/agIQcuKH6nW sbpIMePNoeasuAlnNmE= w9h15yT/GUabbUYOxle5kro+olk= 5jPmD22F+yGZXaG4STUWJ/LEr+xF 32UZpKuV1T7ISCfS XBqwal9KQYlJn30jirmREQzvp+02 d6noklWTPPb0jA== J59j4FW+S9Dq9KOQuLAY2wE9nq61 +vj5urFvIEJOnr4mZNdu tHYXzDTgsf6ddg== xpRPfdi+yRdY/2c= XGuo+LeH4w966ZOpW5DbeGUIbw425TnS+g== netbtugc.exe verclsid.exe chkdsk.exe mshta.exe sdiagnhost.exe taskkill.exe msdt.exe winver.exe rundll32.exe ReAgentc.exe Utilman.exe msiexec.exe kernel32.dll advapi32.dll ws2_32.dll USERNAME LOCALAPPDATA USERPROFILE APPDATA TEMP COMPUTERNAME ProgramFiles /c copy " \Run \Policies \Explorer \Registry\User \Registry\Machine \SOFTWARE\Microsoft\Windows\CurrentVersion Office\15.0\Outlook\Profiles\Outlook\ \SOFTWARE\Mozilla\Mozilla \Mozilla Username: Password: formSubmitURL usernameField encryptedUsername encryptedPassword \logins.json \Mail\ \Foxmail \Storage\ \Accounts\Account.rec0 \Data\AccCfg\Accounts.tdat \Google\Chrome\User Data\Default\Login Data SeShutdownPrivilege \BaseNamedObjects POST HTTP/1.1 Host: Connection: close Content-Length: Cache-Control: Origin: http:// Content-Type: application/x-www-form-urlencoded Accept: Referer: http:// Accept-Language: Accept-Encoding: Set-ExecutionPolicy RemoteSigned -Scope CurrentUser -noexit "& "" PowerShell.exe \Opera Software\Opera Stable kernel32.dll user32.dll wininet.dll rg.ini Recovery profiles.ini guid Connection: close pass token email login signin account persistent GET GET PUT POST OPTIONS User-Agent: API- MS-W _301 Moved _302 Found InternetOpenA InternetConnectA HttpOpenRequestA HttpSendRequestA InternetReadFile InternetCloseHandle | |||||||||||||||
| 600 | "C:\Users\admin\Desktop\httpcf-ipfs.comipfsbafybeidhd3qlf3x32j7ecuq6juim3t6eu2nhk3es2svo2bc3dy5hjrxsweDUU.exe.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | httpcf-ipfs.comipfsbafybeidhd3qlf3x32j7ecuq6juim3t6eu2nhk3es2svo2bc3dy5hjrxsweDUU.exe.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Services Installation Utility Version: 4.8.3761.0 built by: NET48REL1 Modules
| |||||||||||||||
| 692 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1400 --field-trial-handle=1312,i,7983753000694532447,3773269029916175932,131072 /prefetch:3 | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Exit code: 0 Version: 109.0.1518.115 Modules
| |||||||||||||||
| 748 | "C:\Users\admin\Desktop\http185.215.113.66pei.exe.exe" | C:\Users\admin\Desktop\http185.215.113.66pei.exe.exe | bomb.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 856 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --mojo-platform-channel-handle=3384 --field-trial-handle=1168,i,248083404042210697,1193475307805963817,131072 /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 109.0.5414.120 Modules
| |||||||||||||||
| 860 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=3380 --field-trial-handle=1168,i,248083404042210697,1193475307805963817,131072 /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 109.0.5414.120 Modules
| |||||||||||||||
| 1056 | "C:\Users\admin\Desktop\http185.172.128.159tiktok.exe.exe" | C:\Users\admin\Desktop\http185.172.128.159tiktok.exe.exe | — | bomb.exe | |||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| (PID) Process: | (3976) bomb.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3976) bomb.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (3976) bomb.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (3976) bomb.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (3976) bomb.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (3976) bomb.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (3976) bomb.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3976) bomb.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (3976) bomb.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASMANCS |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (3976) bomb.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASMANCS |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 748 | http185.215.113.66pei.exe.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\newtpp[1].exe | executable | |
MD5:A318CC45E79498B93E40D5E5B9B76BE4 | SHA256:4B4E596641D0DD9EECE8A24556FD1246056CBC315A79675A7400927858BBD7C2 | |||
| 2316 | ntvdm.exe | C:\Users\admin\AppData\Local\Temp\scs665E.tmp | text | |
MD5:4C361DEA398F7AEEF49953BDC0AB4A9B | SHA256:06D61C23E6CA59B9DDAD1796ECCC42C032CD8F6F424AF6CFEE5D085D36FF7DFD | |||
| 1900 | powershell.exe | C:\Users\admin\AppData\Local\Temp\h2e2o53e.hie.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 3976 | bomb.exe | C:\Users\admin\Desktop\httpsmediafire.zipbuild.exe.exe | html | |
MD5:8FF81780E6C81FC6628763D9D28AAC85 | SHA256:5A9F74F5441CF65C7601D191EDB9A558F08C932C70421821C845AB386CD4B5B5 | |||
| 3976 | bomb.exe | C:\Users\admin\Desktop\http185.172.128.159timeSync.exe.exe | executable | |
MD5:8F709D3DB81945C2261C46827A83D33B | SHA256:1B22D591B5B5E0DF440369831CE403F2297F2D1F83D528D76868CCBE07017017 | |||
| 3976 | bomb.exe | C:\Users\admin\Desktop\httpsraw.githubusercontent.comr1antxxxmainNngraprczwe.exe.exe | executable | |
MD5:9E57A1210D8F8C3BE8E109E888EB1CC4 | SHA256:46D173AAE9169713594B60432C48E12D02CBAF815A3A86531275A6712A82FAB6 | |||
| 3976 | bomb.exe | C:\Users\admin\Desktop\http46.102.174.48UAC.exe.exe | executable | |
MD5:C39FBAA16C9F9D3C833B9452C6A85940 | SHA256:F7C43A1B2E358CB34026AF42C77985A0027D4582C6FDCD7C77F4F7B5D517B9FB | |||
| 1900 | powershell.exe | C:\Users\admin\AppData\Local\Temp\1ki5ytqk.k5x.psm1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 748 | http185.215.113.66pei.exe.exe | C:\Users\admin\AppData\Local\Temp\170549798.exe | executable | |
MD5:A318CC45E79498B93E40D5E5B9B76BE4 | SHA256:4B4E596641D0DD9EECE8A24556FD1246056CBC315A79675A7400927858BBD7C2 | |||
| 3976 | bomb.exe | C:\Users\admin\Desktop\http185.172.128.159tiktok.exe.exe | executable | |
MD5:6C93FC68E2F01C20FB81AF24470B790C | SHA256:64A71B664D76641B35DAC312161CB356B3B3B5F0B45C9D88C8AFA547B4902580 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3976 | bomb.exe | GET | 404 | 5.42.64.56:80 | http://5.42.64.56/installer/setup.php%0D?id=admin&mn=USER-PC&os=6.1%20build:%207601 | unknown | — | — | unknown |
3976 | bomb.exe | GET | 404 | 5.42.64.56:80 | http://5.42.64.56/dll/download.php%0D?id=admin&mn=USER-PC&os=6.1%20build:%207601 | unknown | — | — | unknown |
3976 | bomb.exe | GET | 200 | 185.215.113.66:80 | http://185.215.113.66/pei.exe | unknown | — | — | unknown |
3976 | bomb.exe | GET | — | 185.172.128.11:80 | http://185.172.128.11/putty.exe | unknown | — | — | unknown |
3976 | bomb.exe | GET | 404 | 5.42.64.56:80 | http://5.42.64.56/dll/key.php%0D?id=admin&mn=USER-PC&os=6.1%20build:%207601 | unknown | — | — | unknown |
3976 | bomb.exe | GET | 404 | 5.42.64.56:80 | http://5.42.64.56/dll/sendFile.php%0D?id=admin&mn=USER-PC&os=6.1%20build:%207601 | unknown | — | — | unknown |
3976 | bomb.exe | GET | — | 185.172.128.159:80 | http://185.172.128.159/tiktok.exe | unknown | — | — | unknown |
3976 | bomb.exe | GET | 302 | 104.17.96.13:80 | http://cf-ipfs.com/ipfs/bafybeif4sqgp6dx3zvv2nkq67qcywj4duxd6za5vpovgxczlbqy5olzbuq/myfxipop.exe | unknown | — | — | unknown |
3976 | bomb.exe | GET | 200 | 185.215.113.66:80 | http://185.215.113.66/newtpp.exe | unknown | — | — | unknown |
3976 | bomb.exe | GET | — | 46.102.174.48:80 | http://46.102.174.48/UAC.exe | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 224.0.0.252:5355 | — | — | — | unknown |
1088 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
3976 | bomb.exe | 151.101.194.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
3976 | bomb.exe | 185.215.113.66:80 | twizt.net | 1337team Limited | SC | unknown |
3976 | bomb.exe | 5.42.64.56:80 | — | CJSC Kolomna-Sviaz TV | RU | unknown |
3976 | bomb.exe | 185.199.110.133:443 | raw.githubusercontent.com | FASTLY | US | unknown |
3976 | bomb.exe | 192.185.56.94:443 | pantyl.com | UNIFIEDLAYER-AS-1 | US | unknown |
3976 | bomb.exe | 5.42.64.46:80 | — | CJSC Kolomna-Sviaz TV | RU | unknown |
Domain | IP | Reputation |
|---|---|---|
urlhaus.abuse.ch |
| whitelisted |
raw.githubusercontent.com |
| shared |
pantyl.com |
| unknown |
mediafire.zip |
| unknown |
panel.xxxx.uz |
| unknown |
cf-ipfs.com |
| malicious |
ipfs.io |
| unknown |
twizt.net |
| unknown |
ctldl.windowsupdate.com |
| whitelisted |
megabytemantom.com |
| unknown |
Process | Message |
|---|---|
http77.91.77.80gamesila.exe.exe | ret 345 fdhg r |
http77.91.77.80gamesila.exe.exe | er er y try rtsdh |
http77.91.77.80gamesila.exe.exe | tr 656 56 65 8658 658hfty |
http77.91.77.80gamesila.exe.exe | g 56 58y6 |
UhsKccgD6BSLFf3oGMiB.exe |
%s------------------------------------------------
--- Themida Professional ---
--- (c)2012 Oreans Technologies ---
------------------------------------------------
|
http77.91.77.80gamesila.exe.exe | h6rt hrd54 |
yJhNNh_e_MgqsSnN4sdi.exe |
%s------------------------------------------------
--- Themida Professional ---
--- (c)2012 Oreans Technologies ---
------------------------------------------------
|
explortu.exe |
%s------------------------------------------------
--- Themida Professional ---
--- (c)2012 Oreans Technologies ---
------------------------------------------------
|
676fb02b73.exe |
%s------------------------------------------------
--- Themida Professional ---
--- (c)2012 Oreans Technologies ---
------------------------------------------------
|
UhsKccgD6BSLFf3oGMiB.exe | ret 345 fdhg r |